Patents Examined by Yin-Chen Shaw
-
Patent number: 9338154Abstract: An authentication apparatus includes a detection unit that detects whether or not communication with a portable storage medium storing identification information for identifying a user is able to be performed, a reading unit that reads identification information stored in the storage medium when the detection unit detects that the communication is able to be performed, a time counting unit that counts an elapsed time, a determination unit that determines whether or not the elapsed time counted by the time counting unit matches a predefined time for the identification information read by the reading unit, and an authentication unit that authenticates the storage medium with which the detection unit detects that the communication is able to he performed when the determination unit determines that the elapsed time counted by the time counting unit matches the predefined time.Type: GrantFiled: May 9, 2013Date of Patent: May 10, 2016Assignee: FUJI XEROX CO., LTD.Inventor: Nao Saita
-
Patent number: 9306754Abstract: A system, apparatus, method, and machine readable medium are described for performing transaction signing within an authentication framework.Type: GrantFiled: December 28, 2012Date of Patent: April 5, 2016Assignee: NOK NOK LABS, INC.Inventors: Davit Baghdasaryan, Matthew Lourie
-
Patent number: 9294359Abstract: This disclosure relates to methods and systems to allow, in one embodiment, automatic access from one system to other systems which include an operating system that includes a user login process. In one embodiment, a method includes logging into, automatically in response to starting a first data processing system, a second data processing system at least as a guest user of the second data processing system which has a storage volume storing data and displaying a user interface object on a display device of the first data processing system, the user interface object corresponding to at least one of the second data processing system and the storage volume to allow at least one of a search to be performed or a browsing to be performed of the data stored on the storage volume.Type: GrantFiled: October 4, 2012Date of Patent: March 22, 2016Assignee: Apple Inc.Inventors: Pavel Cisler, Yan Arrouye, John Iarocci, Marc Jason Krochmal, Christopher Brooke Sharp, Christopher Scott Linn, Mikhail Gonodanov, Simon P. Cooper, Richard Murphy
-
Patent number: 9271256Abstract: Various techniques are provided for Location Services (LCS) Assistance Data broadcast, for example for implementation in LTE and LTE-A systems. The embodiments described herein may use the LPP/LPPe positioning protocol, by making use of existing unsolicited Provide Assistance Data (PAD) messages. Embodiments avoid the need to define and implement a separate broadcast Assistance Data protocol. Additional exemplary embodiments for scheduling and verifying of the broadcast Assistance Data messages are described herein.Type: GrantFiled: August 29, 2012Date of Patent: February 23, 2016Assignee: QUALCOMM INCORPORATEDInventors: Stephen William Edge, Sven Fischer, Philip Michael Hawkes
-
Patent number: 9253151Abstract: Computer system, method and program for managing authentication requests. At a gateway device to a network, packets of a message intended for said network are received. In response, fields within payloads of said packets which contain authentication or authorization information are read. In response, the message is redirected to an authentication server. In response to receipt of the redirected message from the gateway device, the authentication server determines that a requester who sent the message to the gateway device is authorized to access a target resource specified in the message and responds to the gateway device that the requester is authorized to access the target resource. In response, the gateway device responds to the requester that the requester is authorized to access the target resource.Type: GrantFiled: May 25, 2006Date of Patent: February 2, 2016Assignee: International Business Machines CorporationInventors: Richard S. Curtis, Jason D. Forrester
-
Patent number: 9225533Abstract: A first executable program on a computer system is enabled to exchange communications with a second executable program on the computer system by determining that the first executable program requests to exchange information with the second executable program, using the second executable program to challenge the first executable program for a digital certificate, and using the second executable program to exchange information with the first executable program when the digital certificate is verified.Type: GrantFiled: July 21, 2014Date of Patent: December 29, 2015Assignee: AOL Inc.Inventor: Terry N. Hayes
-
Patent number: 9218477Abstract: An electronic asymmetric unclonable function applied to an electronic system being evaluated includes an electronic system and an AUF array electronically associated with the electronic system. The AUF array includes a plurality of non-identical cells. Each of the non-identical cells includes a test element representing a characteristic of the electronic system being evaluated and a measurement device evaluating the test element. A comparison unit processes an output of the measurement device to provide a multi-bit output value representing a magnitude of differences.Type: GrantFiled: April 15, 2013Date of Patent: December 22, 2015Assignee: LEWIS INNOVATIVE TECHNOLOGIESInventors: James M Lewis, Dane R Walther, Paul H Horn
-
Patent number: 9219753Abstract: Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider (“SSP”) configured to perform or provide one or more security-related services or functions with respect to or on behalf of some other system or service. The other system or service may be, for example, a cloud-based system that provides network-accessible services. The SSP allows a user of the cloud-based service to provide and manage one or more security-related services, such as data storage, encryption, decryption, key management, and the like. By using and controlling the SSP, the user can be confident that his or her data is being securely represented and stored, even though it is being operated upon by a cloud-based service that is not under the user's control.Type: GrantFiled: March 4, 2014Date of Patent: December 22, 2015Assignee: DocuSign, Inc.Inventors: Eric Fleischman, Duane Wald, Donald G. Peterson
-
Patent number: 9218493Abstract: A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a unique machine identifier for the user machine. The method further includes modifying the controlled access datum, encrypting the controlled access datum using the PIN and/or a unique machine identifier to camouflage the datum, and generating a passcode using the camouflaged datum and the PIN and/or the unique machine identifier. A mobile user device may be used to execute the method in one embodiment. The passcode may be used to obtain transaction authorization and/or access to a secured system or secured data. The unique machine identifier may be defined by a machine effective speed calibration derived from information collected from and unique to the user machine.Type: GrantFiled: August 13, 2013Date of Patent: December 22, 2015Assignee: CA, Inc.Inventors: Geoffrey Hird, Rammohan Varadarajan
-
Patent number: 9219713Abstract: Electronic electricity meter with integrated digital-certification mechanism for secure communication, comprising current sensors, voltage sensors, electronic circuit for conditioning the current signals and voltage signals in the electrical levels required by the processing unit, processing unit able to continuously sample the current signals and voltage signals provided by the circuit and that reflect, using a known ratio, the real value of the current and voltage delivered to the meter connection terminals, the processing unit calculates the active and passive through energy and determines the energy values to be counted, and a communication unit, linked to the processing unit, which uses a digital data protocol and a physical interface to communicate with the world outside the meter, and a processing unit with digital certification functions located between the processing unit and the communication unit.Type: GrantFiled: November 25, 2011Date of Patent: December 22, 2015Inventors: Fábio de Oliveira Toledo, Welson Regis Jacometti, Rodrigo Jardim Riella, Celso Pinto Saraiva
-
Patent number: 9191206Abstract: Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified amplitudes is selected for each of the digital blocks using a primary mask from a key. Message information is selected from a message using a transformation table generated with a convolution mask. The chosen message information is encoded into each of the transformed digital blocks by altering the selected amplitudes based on the selected message information.Type: GrantFiled: April 22, 2014Date of Patent: November 17, 2015Assignee: Wistaria Trading LtdInventor: Scott A. Moskowitz
-
Patent number: 9191205Abstract: Multiple transform utilization and applications for secure digital watermarking In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified amplitudes is selected for each of the digital blocks using a primary mask from a key. Message information is selected from a message using a transformation table generated with a convolution mask. The chosen message information is encoded into each of the transformed digital blocks by altering the selected amplitudes based on the selected message information.Type: GrantFiled: April 22, 2014Date of Patent: November 17, 2015Assignee: Wistaria Trading LtdInventor: Scott A. Moskowitz
-
Patent number: 9185080Abstract: In an embodiment, a data transmitting device may be provided. The data transmitting device may include a ciphering method selector configured to select a ciphering method based on a type of data to be transmitted. The data transmitting device may further include a ciphering circuit configured to cipher the data based on the selected ciphering method. The data transmitting device may further include a transmitter configured to transmit the ciphered data to a data receiving device.Type: GrantFiled: August 12, 2011Date of Patent: November 10, 2015Assignee: INTEL DEUTSCHLAND GMBHInventor: Hans Bauernfeind
-
Patent number: 9171144Abstract: An electronic asymmetric unclonable function applied to an electronic system being evaluated includes an electronic system and an AUF array electronically associated with the electronic system. The AUF array includes a plurality of non-identical cells. Each of the non-identical cells includes a test element representing a characteristic of the electronic system being evaluated and a measurement device evaluating the test element. A comparison unit processes an output of the measurement device to provide a multi-bit output value representing a magnitude of differences.Type: GrantFiled: April 15, 2013Date of Patent: October 27, 2015Assignee: LEWIS INNOVATIVE TECHNOLOGIESInventors: James M Lewis, Dane R Walther, Paul H Horn
-
Patent number: 9165138Abstract: Methods are disclosed for improving security of computer software and preventing potential attackers from gaining control of computer software via function pointer overwrite attacks. One or more additional layers of complexity may be imposed that would have to be circumvented in order to gain execution control over portions of software. One or more function pointers can be encoded using a value that may be generated on program initialization and decoded before any dynamic function call occurs. In the event of memory corruption that affects an encoded function pointer, the value will cause the destination of the function pointer to decode to an invalid and random address and will induce an error. An application may be prevented from calling an attacker corrupted function pointer by introducing various checks around the call point at compile time that check the validity of the destination to which the function pointer points.Type: GrantFiled: July 11, 2012Date of Patent: October 20, 2015Assignee: Leviathan Security Group, Inc.Inventor: Mlkhail Davidov
-
Patent number: 9148416Abstract: A method is disclosed for providing physical access credentials to a client device. The method may include receiving a request for a physical access credential, where the first request includes at least one user access credential and at least one physical access point identifier. The method may also include determining whether the request should be granted based at least in part on the at least one user access credential. The method may further include, in response to determining that the request should be granted, sending the physical access credential associated with the physical access point.Type: GrantFiled: March 15, 2013Date of Patent: September 29, 2015Assignee: AirWatch LLCInventor: Kar Fai Tse
-
Patent number: 9137660Abstract: The present invention relates to a method and a system for authentication processing, a 3rd Generation Partnership Project (3GPP) Authentication, and Authorization Accounting (AAA) server, and a User Equipment (UE). The method includes: receiving an authentication request message that carries authentication mode indication information; determining an authentication mode according to the authentication mode indication information; and performing authentication processing according to the authentication mode. The system for authentication processing includes the 3GPP AAA server and a network device which enables the UE to access the 3GPP AAA server through the network device.Type: GrantFiled: July 5, 2011Date of Patent: September 15, 2015Assignee: Huawei Technologies Co., Ltd.Inventor: Chengdong He
-
Patent number: 9104324Abstract: Embodiments include methods, apparatus, and systems for managing host logins to storage systems.Type: GrantFiled: August 19, 2006Date of Patent: August 11, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: John G. McCarthy, Jeffrey DiCorpo, Shiraz Billimoria
-
Patent number: 9081957Abstract: This disclosure addresses systems and methods for the protection of proprietary information by monitoring operational watermarks of an apparatus. A monitoring device may receive logical or physical watermark data from a defended apparatus. Watermark data may include any operational or environmental variable related to the defended apparatus. The monitoring device may maintain a baseline profile for the defended apparatus that includes watermark data. During monitoring of the defended apparatus by the monitor device, changes in the watermark data may be analyzed to determine if the baseline should be dynamically updated, or if the change indicates an anomaly. Anomalies may indicate an attempt to tamper with the defended apparatus. In response to the change that indicates an anomaly, the monitoring device may scrub the contents of the defended apparatus. In an embodiment, the monitoring device may also scrub its own memory in response to an anomaly.Type: GrantFiled: February 7, 2013Date of Patent: July 14, 2015Assignee: Ryatheon BBN Technologies CorpInventor: Thomas Gilbert Roden, III
-
Patent number: 9059971Abstract: A secure voice solution for a PDA-type device is provided. Voice data is received from the user using the device microphone and built- in media player software in the device. This data is encrypted and sent as an IP packet. The device then receives, as IP packets, encrypted voice communication from the other party in the encrypted call, which in turn are decrypted in the device and played back on a second media player running on the device. The present invention takes advantage of the device's ability to run two media players simultaneously to in effect, simulate a cellular telephone call. As a result, an encrypted call can be made with PDA-type devices such as the Blackberry® and also such calls can be made using different data paths (cellular, WiFi, Bluetooth) as the calls are made by sending and receiving data over the Internet, not as traditional cellular data signals.Type: GrantFiled: March 10, 2011Date of Patent: June 16, 2015Assignee: KOOLSPAN, INC.Inventors: Andrew Graham, Michael Kopec